Privacy Seminar 2018
This is the main web site for the Privacy Seminar (NWI-I00136) of the TRU/e security master.
In this seminar we will explore the state of the art in privacy enhancing technologies (PET), and discuss theories (technical, legal and societal) of privacy.
AnnouncementNote: Be sure you also carefully prepare your role as opponent. See the assignment in the schedule below.
The following topics have been claimed so far (22-2-2018): Anonymous cryptocurrency, Privacy in Big Data, Privacy friendly search, Anonymous messaging, RFID/IoT, Electronic Voting, Smart metering/smart grids.
The course code is NWI-I00136.
You will do, in groups of two, a small research project on a particular topic, chosen from a list. The idea is to let you first investigate a particular practical case (what are the privacy issues (from a legal and societal perspective), how are they dealt with), and then let you perform some research using particular PETs to solve the problem. You present the results in class as well as writing a student paper on the same topic. Finally, you will serve as an opponent when another group presents a topic.
Presence at all lectures is mandatory! (Not present without a valid reason = fail!). Valid reasons are: illness, accident, other study obligation (like exams, study trip), important family events. Invalid reasons are: holidays, trips etc, even if booked before the course started, and many many others.
The final grade = (4 * grade for paper + 2 * grade for presentation + grade for opposition) / 7. If the grade for the paper, presentation or opposition is below 5.5, the lowest grade is the final grade!
PrerequisitesYou should have successfully completed the Cryptography course.
LecturesThe first few lectures will be spent on outlining the course and the area of privacy enhancing technologies. We also have several invited guest lectures. Slides of the lectures will become available after the lecture.
WikiThe course is supported by a wiki, to which all are invited to contribute. You can go the wiki to request an account to get edit rights.
DeadlinesThe paper skeleton must be submitted on or before May 3. Deadline for the final paper is June 14. Both deadlines: 12 o'clock *noon*.
- Jaap-Henk Hoepman and Marc van Lieshout: "Privacy". Chapter of a book.
- G. Danezis et. al., Privacy and Data Protection by Design, ENISA Report, december 2014.
- Slide deck on how to write a good research paper.
- Some information about how to prepare a good scientific presentation.
- Slides of the first two lectures (see schedule below).
- The Privacy Wiki
Schedule (spring 2018)Lectures take place from 10:45 to 12:30 in room HG00.071. Slides of presentations that are available are linked from here. The links are released after the lecture.
Please note that this is a seminar. Therefore the classes are not taught as a video lecture!
|February 8||Course overview and Privacy: an overview, by Merel Koning|
|February 15||(no lecture)|
|February 22||Basic techniques I, by Jaap-Henk Hoepman.|
|March 1||Privacy Impact Assessments, by Merel Koning|
|March 8||(Lecture cancelled due to illness)|
|March 15||Smart Metering / smart grids, by Erwin Janssen and David de Muinck Keizer||Coen Boot and Wouter Kuhnen and Daan Sprenkels|
|March 22||Basic techniques II, by Jaap-Henk|
|March 29||Hans de Zwart, Bits of Freedom.|
|April 5||(no lecture)|
|April 12||(no lecture)|
|April 19||(no lecture)|
|April 26||RFID / Internet of things, Leon Botros and Wesley van Hoorn||Mariami Gonashvili and Michael Strasser|
|May 3||(no lecture)||Deadline paper skeleton|
|May 10||(no lecture)|
|May 17||Privacy friendly search, by Denisa Greconici and Niels Roelofs||Leon Botros and Wesley van Hoorn|
|May 24||Privacy in big data, by Mariami Gonashvili and Michael Strasser||Rik Dolfing and Michiel Marcus|
|May 31||Anonymous messaging, by Tim van Dijk and Lars Deelen||Martin rosso and Nikos Mavroulis|
|June 7||Anonymous crypto currency, by Coen Boot and Wouter Kuhnen and Daan Sprenkels.||Erwin Janssen and David de Muinck Keizer|
|June 14||Electronic voting, by Martin Rosso and Nikolaos Mavroulis||Tim van Dijk and Lars Deelen||Deadline student paper|
|June 21||Biometrical storage and authentication, by Rik Dolfing and Michiel Markus||Denisa Greconici and Niels Roelofs|
Last Version -
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman